US20130225126A1 - System and method for privacy-enabled mobile locator services with dynamic encounter horizon - Google Patents
System and method for privacy-enabled mobile locator services with dynamic encounter horizon Download PDFInfo
- Publication number
- US20130225126A1 US20130225126A1 US13/857,335 US201313857335A US2013225126A1 US 20130225126 A1 US20130225126 A1 US 20130225126A1 US 201313857335 A US201313857335 A US 201313857335A US 2013225126 A1 US2013225126 A1 US 2013225126A1
- Authority
- US
- United States
- Prior art keywords
- user
- visibility
- buddy
- designation
- location
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/75—Indicating network or usage conditions on the user display
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/51—Discovery or management thereof, e.g. service location protocol [SLP] or web services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/52—Network services specially adapted for the location of the user terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/72427—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality for supporting games or graphical animations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72457—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to geographic location
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/42136—Administration or customisation of services
- H04M3/4217—Managing service interactions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/42365—Presence services providing information on the willingness to communicate or the ability to communicate in terms of media capability or network connectivity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/025—Services making use of location information using location based information parameters
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2242/00—Special services or facilities
- H04M2242/15—Information service where the information is dependent on the location of the subscriber
Definitions
- This invention relates to mobile devices, communication systems and location privacy.
- Mobile communication devices including cell phones, PDA's and smart phones have become commonplace in our society. Most mobile telephones are no longer just used as a telephone device; rather these devices have much more sophisticated applications. For example, smartphones are capable of e-mail, internet access, text messaging, SMS messaging and providing GPS directions. Many smartphones can also track user location, and allow users to opt-in to disclose their location information to a list of “buddies.” These buddies can use their mobile devices to determine other buddies' locations providing the queried buddies have granted the querying buddies access (e.g., via a buddy list).
- Mobile Find my Buddy applications are those in which a mobile device application displays a map on the screen of the mobile device and plots the locations of a given user's buddies. This is done via interworking with one or more servers in the network that store and manage user identities and locations. These systems may or may not also represent those buddies' present status (e.g., busy, listening to music, etc.). The screen on which one buddy sees his/her other buddies is sometimes referred to as the “radar.” It is rendered on the mobile device and sometimes on a desktop device as well. These applications are also known as “buddy trackers,” “friend locators” among others.
- the applications report the location of the users to a server.
- the buddy application then pulls locations of the users' buddies and displays them on a map for the user. As the user pans and zooms in his/her radar screen, the user's map can then display new buddies now within range. As buddies pan and zoom in their radar screens, the buddies map can then display the user's location previously not in the range of the buddies' radar screen.
- FIG. 1 is an illustration of the present model of buddy locator services.
- a user 2 enters identifying information of a buddy 4 into the application 3 on the user 2 's mobile device.
- Buddy 4 enters the identifying information of user 2 into the application 5 on the buddy 4 's mobile device.
- Both user application 3 and buddy application 5 can be the same obtained software program.
- Both user 2 's application 3 and buddy 4 's application 5 send location information to a server 6 .
- Server 6 sends user 2 's location information to buddy 4 's application 5 .
- Server 6 also sends buddy 4 's location information to user 2 's application 3 . If the map view of user 2 's application 3 encompasses the location buddy 4 is in, buddy 4 's location will be indicated. If the map view of buddy 4 's application 5 encompasses the location user 2 is in, user 2 's location will be indicated.
- the present model of these buddy locator services allow users to opt-in to being visible to a pre-defined group of buddies. Users can modify the group and also can change their visibility (e.g., be visible, invisible etc.) to the buddy list group as a whole or to individuals on the buddy list. For users to make themselves invisible to others on their buddy list, they typically have to manually change the settings on their mobile devices.
- the services presently available do not provide any advanced warning or awareness to a user as to which of the buddies on the user's buddy list is viewing the user's location, or when one of the buddies on the user's buddy list will be viewing the user's location in the near future, either by the buddy physically travelling into a specified range around the user, or the buddy searching a map on the buddies' mobile device.
- the user must assume that for all of the buddies listed on all of the user's buddy applications for whom the user has set a visible status, the user may appear on those buddies' radar screens at any time.
- mapping application to be notified based on the actions of any or all individual listed buddies and to have visibility options prior to becoming visible to buddies.
- the system for managing a mobile device's visibility comprises a mobile device, a mobile application listing one or more buddies, an application listener which tracks the one or more buddies' map interactions (e.g., zoom factors, pan operations, etc.; the map is often presented to appear similar to a “radar screen” on buddy mapping graphical interfaces), and a server, the server comprising an encounter manager, an approach manager and a notification marshalling system.
- the system can also include a learning component.
- the encounter manager of the system can receive input regarding various encounter horizons.
- the method for managing a mobile device's visibility comprises the steps of inputting one or more buddies into a user's mobile application, listening to the one or more buddies zoom operations and radar zoom factors, determining an impending detection of the user's location, notifying the user that their location will be detected by the one or more buddies, and choosing a visibility option.
- the method for managing a mobile device's visibility can provide the choice of several visibility options including—but not limited to—the option to appear, not appear, appear anonymously or appear at a later time on the buddy's radar.
- notification of a user's impending detection can occur at a predetermined context related to the encounter horizons of the parties in question.
- This notification can be a textual message notification and/or a graphic message notification.
- FIG. 1 illustrates a prior art buddy locator service
- FIG. 2 illustrate an exemplary architecture for a system for managing a mobile device's visibility
- FIG. 3 illustrates an example of the situation where a buddy is approaching a user
- FIG. 4 illustrates an example of the situation where a buddy is changing his zoom factor and the user is stationary
- FIG. 5 illustrates an example of the situation where a buddy turns on his device with the mapping zoom factor such that the buddy map view already encompasses a user's position.
- Server shall mean any centralized application device that receives updates from a plurality of user equipment.
- Radar screen shall mean a map view of specific physical dimensions seen on a user's mobile device or a buddy's mobile device. Radar screen is typically managed and presented by a mobile application 14 , which is further described below.
- FIG. 2 illustrates an example of the system for managing a mobile device's visibility 10 which includes the following components, a mobile device 12 , the mobile application 14 listing one or more buddies, an application listener 16 which tracks the one or more buddies' zoom operations and radar zoom factors, and a server 18 , the server 18 comprising an encounter manager 20 , an approach manager 22 and a notification marshalling system 24 .
- Server 18 can also include a learning component 26 .
- the method for managing a mobile device's visibility comprises the following steps, which are further described below in the description of the system for managing a mobile device's visibility.
- the first step of the method for managing a mobile device's visibility is inputting identification information of one or more buddies into a user's mobile application.
- the user's application listens (by receiving updates) to the activity of one or more buddies as they move geographically and change the scope and area on their radar screens. If while during the listening period, the user's application determines that the user is subject to an impending detection by one or more buddies, the application will notify the user that his or her location will be detected by the one or more buddies.
- the user Upon notification, the user will then have several visibility options to choose from including but not limited to “make me visible”, “do not make me visible”, “let me be seen anonymously”, or “let me be seen anonymously with one or more specified attributes”, or “let me be seen at a point later in time (perhaps anonymously) by the one or more buddies.”
- the previously listed visibility options are by no means exhaustive, other visibility options are possible.
- the system for managing a mobile device's visibility includes a mobile device 12 which can be any mobile device capable of supporting mobile application 14 , including but not limited to cellular telephones, PDA's, smart phones and laptops.
- Mobile application 14 is supported by a user's mobile device 12 .
- Mobile application 14 accepts inputs of one or more buddies' identifying information, which mobile application 14 stores as a list. The buddy would also have the user's identifying information.
- application listener 16 is a component that integrates with and synchronizes with a mapping part of mobile application 14 on mobile device 12 . Both the user and buddy would have substantially the same mobile application 14 on their individual mobile devices 12 .
- Both the user and buddy would also have substantially the same individual application listeners 16 as part of their mobile applications 14 on their individual mobile device 12 .
- application listener 16 listens for these map change events including the buddy physically moving, the buddy panning north, south, east or west or the buddy zooming in and out (e.g., pan and zoom actions occur via interactions with the mobile application 14 and are heard by the application listener 16 ).
- Application listener 16 is in communication with server 18 .
- Server 18 contains encounter manager 20 , approach manager 22 and notification marshalling system 24 .
- Encounter manager 20 is a component that stores near real-time information relating to user location and user proximity to other objects, and captures how and when the system should respond to users becoming visible or their future visibility predicaments.
- Seen on a map encounter horizons are typically circular shapes emanating from the user's location. While encounter horizons are managed by the system and may be created automatically, information inputted by the user (e.g., distances, actions) may be used to create encounter horizons. For example, the user may set up encounter horizons at various distances around his current location to be triggered when a particular buddy or group of buddies crosses it. If a buddy in the real-world crosses the encounter horizon's logical demarcation point or moves the scope of the radar screen to cross the encounter horizon, encounter manager 20 will notify notification marshalling system 24 .
- Encounter manager 20 can receive input to set up several encounter horizons at varying distances with a different weighting or importance assigned to the respective encounter horizons. For example, if a buddy physically crosses the encounter horizon which is furthest away from the user or moves the scope of the radar screen to cross the outermost encounter horizon, which is furthest away from the user, this event can be assigned a low weighting. A low weighting can mean a notification, as described below, which is indicative of this level of importance or weight. Different weightings may be assigned to different buddies listed in the user's mobile application 14 . For example, weightings of encounter horizons increasingly closer to the user can be tagged with increasingly important weights, which will, in turn, allow the system to respond with an urgency proportional to distance.
- Encounter manager 20 can store preferences which are input by the user for importance of each of the buddies on the user's buddy list entering a specific encounter horizon. For example, the manager 20 can give some buddies a higher importance at further distances and some buddies a lower importance at closer distances.
- Server 18 also includes approach manager 22 .
- Approach manager 22 receives information from external systems relating to speed and direction of travel of a given buddy or group of buddies. By caching some previous data, approach manager 22 can compute direction and speed and store it. The system can use current location and direction and speed to estimate when encounter horizons will be crossed. If a buddy physically moves or moves the scope of his radar screen and the approach manager 22 determines, for example, based on the speed of movement and vector of approach, that a buddy's movement will place the user within the buddy's radar screen, approach manager 22 can notify notification marshalling system 24 to transmit the appropriate warning.
- notification marshalling system 24 can send a notification to the user, giving the user visibility options.
- Notification marshalling system 24 can send a notification which can include a statement such as, “You will be visible on buddy B's radar screen in 5 minutes” or “You are about to be visible on buddy B's radar screen”
- Notification marshalling system 24 can be programmed to send a textual notification to the user, such as a text message or e-mail, or a graphical notification such as a picture or video.
- Notification marshalling system 24 also can send several visibility options to the user, from which the user can pick. These visibility options can include the following. Notification marshalling system 24 can send a visibility option to the user which, upon choosing by the user, will allow buddy B to see the user on his/her or the radar screen. Notification marshalling system 24 can send a visibility option to the user which, upon choosing by the user, will not allow buddy B to see the user on the radar screen, thus cloaking the user's location. Notification marshalling system 24 can send a visibility option to the user which, upon choosing by the user, will allow buddy B to see the user on the radar screen, but as an anonymous person.
- the user can enter into the user's mobile application 14 what will be displayed on buddy B's radar screen if the user chooses the anonymous visibility option.
- User can enter an anonymous profile into the user's mobile application 14 , such as display “30 year old male” when the user chooses the anonymous visibility option instead of any identifying material.
- Notification marshalling system 24 can also send a visibility option to the user which will allow buddy B to see the user on the radar screen, but after a predetermined time. The user can enter into the user's mobile application 14 how long this time period will be.
- the user will remain cloaked from view on buddy 13 's radar screen.
- the user can also enter into the user's mobile application 14 to automatically let specific buddies see him without responding to a visibility option.
- the user's visibility choice is captured and processed by server 18 and then sent to buddy 13 's application listener 16 .
- Buddy B's application listener 16 can display user if user has allowed his location to be seen, cloak the user if the user has chosen to not allow his location to be seen, display the user as anonymous, or display the user after a period of time.
- the instrumentation to affect the user's visibility may be on one of server 18 's components.
- Server 18 can also include learning component 26 which can use standard techniques to learn from how the user responds to visibility options from each individual buddy over time.
- Learning component 26 can create heuristics that can allow learning component 26 to eventually make visibility option decisions for the user automatically. For example, if the user always allows a certain buddy to view the user's location between the hours of 8 AM and 10 PM, learning component 26 can automatically choose the visibility option that would allow the buddy to see the user during those hours.
- the learning component can employ various neural nets algorithms as well as statistical correlation methodologies to come up with the heuristics. Having such heuristics adds to the usability of the system as it will not require the user to specify visibility options explicitly. Once the learning component infers a visibility option it will ask the user to approve that option.
- the described system and method manages a mobile device's visibility to the buddies on a user's buddy list and warns a user when his visibility will be divulged. This results in better privacy control for the user. Additionally, the user will receive information regarding the buddy trying to view the user, giving the user's privacy choice the proper information needed to choose a visibility option if a per-buddy warn policy is desired.
- Conditions for the following examples include the condition that the user in question has opted-in to the mobile buddy mapping service and carries his mobile device which is loaded with the software and instrumentation of the present invention in addition to the mobile buddy mapping service. Further, it is a condition that in the mobile buddy mapping service, the user has buddy lists containing a buddy, and the buddy has a buddy list including the user. Another condition is that user and buddy locations are captured or visible to application components by, for example, partnering with location providers or interfacing with Geographic Positioning System (GPS) hardware.
- GPS Geographic Positioning System
- the System set up The user sets up global “encounter horizons” transition actions, or the system will apply some default rules based on some categorization of the user.
- the user can set up per-buddy encounter horizon transition actions or the system can apply a global rule.
- the user sets up an anonymized profile (e.g. “identify me as x, y or z when I allow myself to be seen anonymously”) which can be customized to the individual buddy or set globally.
- the user sets up personalized notification policies on what kinds of messages the system should deliver and how they should be delivered. For example, the system can send text messages, e-mails, video messages, picture messages, etc.
- Example of when a buddy is approaching a user As illustrated in FIG. 3 , user 30 is stationary at position P u and buddy 32 is moving at a velocity of V b towards P u User 30 has set encounter horizon transitions for distances r 1 34 and r 2 36 (r r 1 ⁇ r 2 ). The user can set several more encounter horizon transitions if desired.
- Buddy 32 's current radar view shown on buddy 32 's mobile device is represented by buddy horizon 33 . As buddy horizon 33 crosses encounter horizon transition r 2 36 , the system triggers an event (text message, etc) and stores buddy 32 's radar view.
- the system determines, based on buddy horizon 33 and buddy 32 's computed speed, that it is time to notify user 30 that he will soon be visible on buddy 32 's radar.
- the system then sends a message, providing visibility options such as make me visible, cloak me, show me anonymously and make me visible in 10 minutes, etc., to user 30 .
- User 30 can input options that keep user 30 cloaked until he answers or makes him visible after a certain time on a per buddy or a global basis.
- user 30 After user 30 chooses a visibility option, user 30 will either appear on buddy 32 's radar identified as the user, appear on buddy 32 's radar anonymously, not appear on buddy 32 's radar at all, or appear on buddy 32 's radar at a later time.
- user 40 is at position P u and buddy 42 is at position P b .
- Buddy 42 's current radar view shown on buddy 42 's mobile device is represented by buddy horizon 44 .
- User 40 is presently not visible on buddy 42 's radar because P u is outside the scope of buddy horizon 44 .
- buddy 42 begins to zoom out on buddy 42 's radar, so that the radar screen starts showing a larger geographical area, or buddy 42 begins to move the scope of buddy 42 's radar to cover a different geographic area.
- the application listening component of buddy 42 's application records the zoom operation, each move of buddy 42 's radar scope causes a message to be marshaled and sent to the server.
- the server tracks the implications of buddy 42 's zoom operation. After a few zoom operations, it becomes clear that buddy horizon 44 will soon encompass user 40 's position.
- the system Prior to buddy 42 's zoom operation that would place user 40 within buddy 42 's radar, the system infers that the new region would threaten to make user 40 visible and the application listening component 16 of user 40 's application notifies user 40 of impending visibility and gives user 40 visibility options such as make me visible, cloak me, show me anonymously and make me visible in 10 minutes, etc.
- User 40 can either respond or, if user 40 is not currently with his device, pre-set actions including an automatic cloak decision or automatic make me visible action can be taken. If user 40 does choose a visibility option, user 40 will either appear on buddy 42 's radar identified as the user, appear on buddy 42 's radar anonymously, not appear on buddy 42 's radar at all or appear on buddy 42 's radar at a later time.
- the server responds to buddy 42 's application listeners' notification with user 40 's choice and will either show user 40 on buddy 42 's radar, not show user 40 on buddy 42 's radar, show user 40 's anonymous profile or show user 40 at a later time.
- buddy 42 uses pan operations to change his map view, instead of a zoom operation, and those views would threaten to make user 40 visible, then the system takes similar steps to ensure that user 40 is made aware of the impending visibility and given visibility options.
- This example is very similar to example 3, except that the system now tracks the buddy's motion as well as the buddy's radar view at every zoom operation. Either the buddy can enter the user's outermost boundary or the user can move to a point where the buddy is within the user's outermost boundary. The fact that the user is moving does not affect the system.
- Example when a buddy turns on his device with the radar zoom factor already encompassing a user's position As illustrated in FIG. 5 , a user 50 and a buddy 52 are near each other, within buddy 52 's buddy horizon 56 if buddy 52 's mobile device were on, but buddy 52 's device is off. Buddy 52 then turns on buddy 52 's mobile device, the application 14 and the application listening component 16 of buddy 52 's device send a message to the server 6 indicating the “power on” event and can also include a message concerning buddy 52 's initial buddy horizon 56 . The server then checks to see which users will be visible on buddy 52 's radar, consequently inferring that user 50 will be.
- the server sends a message to user 50 , giving user 50 visibility options such as make me visible, cloak me, show me anonymously and make me visible in 10 minutes etc.
- buddy 52 's radar view will have user 50 appear identified as himself, appear anonymously, not appear at all or appear at a later time. If user 50 's application has been set up by user 50 to automatically allow user 50 to be visible to buddy 52 , the server 6 will then contact buddy 42 's application listening component to make user 50 visible in buddy 52 's radar view.
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Human Computer Interaction (AREA)
- Environmental & Geological Engineering (AREA)
- Telephonic Communication Services (AREA)
- Mobile Radio Communication Systems (AREA)
- Information Transfer Between Computers (AREA)
- Telephone Function (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
- This application is a Continuation of U.S. application Ser. No. 12/617,844, filed Nov. 13, 2009, which claims priority from U.S. Provisional Application 61/159,977, filed Mar. 13, 2009, incorporated herein by reference in their entirety.
- This invention relates to mobile devices, communication systems and location privacy.
- Mobile communication devices including cell phones, PDA's and smart phones have become commonplace in our society. Most mobile telephones are no longer just used as a telephone device; rather these devices have much more sophisticated applications. For example, smartphones are capable of e-mail, internet access, text messaging, SMS messaging and providing GPS directions. Many smartphones can also track user location, and allow users to opt-in to disclose their location information to a list of “buddies.” These buddies can use their mobile devices to determine other buddies' locations providing the queried buddies have granted the querying buddies access (e.g., via a buddy list).
- “Mobile Find my Buddy” applications are those in which a mobile device application displays a map on the screen of the mobile device and plots the locations of a given user's buddies. This is done via interworking with one or more servers in the network that store and manage user identities and locations. These systems may or may not also represent those buddies' present status (e.g., busy, listening to music, etc.). The screen on which one buddy sees his/her other buddies is sometimes referred to as the “radar.” It is rendered on the mobile device and sometimes on a desktop device as well. These applications are also known as “buddy trackers,” “friend locators” among others.
- In existing buddy applications, the applications report the location of the users to a server. The buddy application then pulls locations of the users' buddies and displays them on a map for the user. As the user pans and zooms in his/her radar screen, the user's map can then display new buddies now within range. As buddies pan and zoom in their radar screens, the buddies map can then display the user's location previously not in the range of the buddies' radar screen.
-
FIG. 1 . is an illustration of the present model of buddy locator services. Auser 2 enters identifying information of a buddy 4 into theapplication 3 on theuser 2's mobile device. Buddy 4 enters the identifying information ofuser 2 into the application 5 on the buddy 4's mobile device. Bothuser application 3 and buddy application 5 can be the same obtained software program. Bothuser 2'sapplication 3 and buddy 4's application 5 send location information to aserver 6.Server 6 sendsuser 2's location information to buddy 4's application 5.Server 6 also sends buddy 4's location information touser 2'sapplication 3. If the map view ofuser 2'sapplication 3 encompasses the location buddy 4 is in, buddy 4's location will be indicated. If the map view of buddy 4's application 5 encompasses thelocation user 2 is in,user 2's location will be indicated. - The present model of these buddy locator services allow users to opt-in to being visible to a pre-defined group of buddies. Users can modify the group and also can change their visibility (e.g., be visible, invisible etc.) to the buddy list group as a whole or to individuals on the buddy list. For users to make themselves invisible to others on their buddy list, they typically have to manually change the settings on their mobile devices.
- As more and more services become available, it becomes increasingly difficult for a given user to keep track of which of their buddies they should be visible to and which they should not at a point in time or place. For example, if a user has two or three different buddy lists with two or three buddy mapping services, it quickly becomes difficult to manage visibility on a buddy by buddy basis. Further, it becomes harder to change settings for each individual buddy when you don't know his/her location or whether he/she will be viewing your location in the near future. For a variety of reasons, a user may want to have awareness of his visibility across a variety of other buddies' and groups devices through time and location.
- For users, manually making themselves invisible or stopping the service during times when they want privacy is annoying, disruptive, and time consuming. Simply shutting off the buddy mapping service will affect all of the user's buddies, a consequence that may not be desired. Having to turn off visibility on a per buddy basis, in turn, forces the user to manage a potentially large set of individualized settings and quickly becomes infeasible with scale.
- The services presently available do not provide any advanced warning or awareness to a user as to which of the buddies on the user's buddy list is viewing the user's location, or when one of the buddies on the user's buddy list will be viewing the user's location in the near future, either by the buddy physically travelling into a specified range around the user, or the buddy searching a map on the buddies' mobile device. Presently, the user must assume that for all of the buddies listed on all of the user's buddy applications for whom the user has set a visible status, the user may appear on those buddies' radar screens at any time.
- Accordingly, there is a need for a user of a buddy, mapping application to be notified based on the actions of any or all individual listed buddies and to have visibility options prior to becoming visible to buddies.
- Accordingly, disclosed is a system for managing a mobile device's visibility with respect to mobile buddy mapping applications and for increasing end users' awareness of their own visibility in near real-time. The system for managing a mobile device's visibility comprises a mobile device, a mobile application listing one or more buddies, an application listener which tracks the one or more buddies' map interactions (e.g., zoom factors, pan operations, etc.; the map is often presented to appear similar to a “radar screen” on buddy mapping graphical interfaces), and a server, the server comprising an encounter manager, an approach manager and a notification marshalling system.
- The system can also include a learning component. The encounter manager of the system can receive input regarding various encounter horizons.
- Also disclosed is a method for managing a mobile device's visibility. The method for managing a mobile device's visibility comprises the steps of inputting one or more buddies into a user's mobile application, listening to the one or more buddies zoom operations and radar zoom factors, determining an impending detection of the user's location, notifying the user that their location will be detected by the one or more buddies, and choosing a visibility option.
- The method for managing a mobile device's visibility can provide the choice of several visibility options including—but not limited to—the option to appear, not appear, appear anonymously or appear at a later time on the buddy's radar.
- In the method managing a mobile device's visibility, notification of a user's impending detection can occur at a predetermined context related to the encounter horizons of the parties in question. This notification can be a textual message notification and/or a graphic message notification.
- These and other features, benefits, and advantages of the present invention will become apparent by reference to the following figures, with like reference numbers referring to like structures across the views, wherein:
-
FIG. 1 illustrates a prior art buddy locator service; -
FIG. 2 illustrate an exemplary architecture for a system for managing a mobile device's visibility; -
FIG. 3 illustrates an example of the situation where a buddy is approaching a user; -
FIG. 4 illustrates an example of the situation where a buddy is changing his zoom factor and the user is stationary; and -
FIG. 5 illustrates an example of the situation where a buddy turns on his device with the mapping zoom factor such that the buddy map view already encompasses a user's position. - For purposes of the description in this application the following definitions shall apply.
- Server shall mean any centralized application device that receives updates from a plurality of user equipment.
- Radar screen shall mean a map view of specific physical dimensions seen on a user's mobile device or a buddy's mobile device. Radar screen is typically managed and presented by a
mobile application 14, which is further described below. - The present application is directed towards a method and system for managing a mobile device's visibility.
FIG. 2 illustrates an example of the system for managing a mobile device'svisibility 10 which includes the following components, amobile device 12, themobile application 14 listing one or more buddies, anapplication listener 16 which tracks the one or more buddies' zoom operations and radar zoom factors, and aserver 18, theserver 18 comprising anencounter manager 20, anapproach manager 22 and a notification marshalling system 24.Server 18 can also include alearning component 26. - The method for managing a mobile device's visibility comprises the following steps, which are further described below in the description of the system for managing a mobile device's visibility. The first step of the method for managing a mobile device's visibility is inputting identification information of one or more buddies into a user's mobile application. The user's application listens (by receiving updates) to the activity of one or more buddies as they move geographically and change the scope and area on their radar screens. If while during the listening period, the user's application determines that the user is subject to an impending detection by one or more buddies, the application will notify the user that his or her location will be detected by the one or more buddies. The criteria defining “impending detection”—also known as visibility awareness—can be set at different levels for different buddies and notifications can be sent earlier for some buddies and later for other buddies. Notification urgency can also be based on settings on a per buddy or on a global buddy list level. Upon notification, the user will then have several visibility options to choose from including but not limited to “make me visible”, “do not make me visible”, “let me be seen anonymously”, or “let me be seen anonymously with one or more specified attributes”, or “let me be seen at a point later in time (perhaps anonymously) by the one or more buddies.” The previously listed visibility options are by no means exhaustive, other visibility options are possible.
- The system for managing a mobile device's visibility includes a
mobile device 12 which can be any mobile device capable of supportingmobile application 14, including but not limited to cellular telephones, PDA's, smart phones and laptops.Mobile application 14 is supported by a user'smobile device 12.Mobile application 14 accepts inputs of one or more buddies' identifying information, whichmobile application 14 stores as a list. The buddy would also have the user's identifying information. As part ofmobile application 14,application listener 16 is a component that integrates with and synchronizes with a mapping part ofmobile application 14 onmobile device 12. Both the user and buddy would have substantially the samemobile application 14 on their individualmobile devices 12. Both the user and buddy would also have substantially the sameindividual application listeners 16 as part of theirmobile applications 14 on their individualmobile device 12. As buddies listed inmobile application 12 physically move or move the scope appearing on their radar screen,application listener 16 listens for these map change events including the buddy physically moving, the buddy panning north, south, east or west or the buddy zooming in and out (e.g., pan and zoom actions occur via interactions with themobile application 14 and are heard by the application listener 16). -
Application listener 16 is in communication withserver 18.Server 18 containsencounter manager 20,approach manager 22 and notification marshalling system 24.Encounter manager 20 is a component that stores near real-time information relating to user location and user proximity to other objects, and captures how and when the system should respond to users becoming visible or their future visibility predicaments. Seen on a map, encounter horizons are typically circular shapes emanating from the user's location. While encounter horizons are managed by the system and may be created automatically, information inputted by the user (e.g., distances, actions) may be used to create encounter horizons. For example, the user may set up encounter horizons at various distances around his current location to be triggered when a particular buddy or group of buddies crosses it. If a buddy in the real-world crosses the encounter horizon's logical demarcation point or moves the scope of the radar screen to cross the encounter horizon,encounter manager 20 will notify notification marshalling system 24. -
Encounter manager 20 can receive input to set up several encounter horizons at varying distances with a different weighting or importance assigned to the respective encounter horizons. For example, if a buddy physically crosses the encounter horizon which is furthest away from the user or moves the scope of the radar screen to cross the outermost encounter horizon, which is furthest away from the user, this event can be assigned a low weighting. A low weighting can mean a notification, as described below, which is indicative of this level of importance or weight. Different weightings may be assigned to different buddies listed in the user'smobile application 14. For example, weightings of encounter horizons increasingly closer to the user can be tagged with increasingly important weights, which will, in turn, allow the system to respond with an urgency proportional to distance.Encounter manager 20 can store preferences which are input by the user for importance of each of the buddies on the user's buddy list entering a specific encounter horizon. For example, themanager 20 can give some buddies a higher importance at further distances and some buddies a lower importance at closer distances. -
Server 18 also includesapproach manager 22.Approach manager 22 receives information from external systems relating to speed and direction of travel of a given buddy or group of buddies. By caching some previous data,approach manager 22 can compute direction and speed and store it. The system can use current location and direction and speed to estimate when encounter horizons will be crossed. If a buddy physically moves or moves the scope of his radar screen and theapproach manager 22 determines, for example, based on the speed of movement and vector of approach, that a buddy's movement will place the user within the buddy's radar screen,approach manager 22 can notify notification marshalling system 24 to transmit the appropriate warning. - Upon receiving information from either
encounter manager 20 orapproach manager 22 that a buddy's radar screen is or soon will be encompassing an area where the user is located, notification marshalling system 24 can send a notification to the user, giving the user visibility options. Notification marshalling system 24 can send a notification which can include a statement such as, “You will be visible on buddy B's radar screen in 5 minutes” or “You are about to be visible on buddy B's radar screen” Notification marshalling system 24 can be programmed to send a textual notification to the user, such as a text message or e-mail, or a graphical notification such as a picture or video. - Notification marshalling system 24 also can send several visibility options to the user, from which the user can pick. These visibility options can include the following. Notification marshalling system 24 can send a visibility option to the user which, upon choosing by the user, will allow buddy B to see the user on his/her or the radar screen. Notification marshalling system 24 can send a visibility option to the user which, upon choosing by the user, will not allow buddy B to see the user on the radar screen, thus cloaking the user's location. Notification marshalling system 24 can send a visibility option to the user which, upon choosing by the user, will allow buddy B to see the user on the radar screen, but as an anonymous person. The user can enter into the user's
mobile application 14 what will be displayed on buddy B's radar screen if the user chooses the anonymous visibility option. User can enter an anonymous profile into the user'smobile application 14, such as display “30 year old male” when the user chooses the anonymous visibility option instead of any identifying material. Notification marshalling system 24 can also send a visibility option to the user which will allow buddy B to see the user on the radar screen, but after a predetermined time. The user can enter into the user'smobile application 14 how long this time period will be. - If the user does not respond to the visibility options sent by notification marshalling system 24, the user will remain cloaked from view on buddy 13's radar screen. The user can also enter into the user's
mobile application 14 to automatically let specific buddies see him without responding to a visibility option. - The user's visibility choice is captured and processed by
server 18 and then sent to buddy 13'sapplication listener 16. Buddy B'sapplication listener 16 can display user if user has allowed his location to be seen, cloak the user if the user has chosen to not allow his location to be seen, display the user as anonymous, or display the user after a period of time. Alternatively, the instrumentation to affect the user's visibility may be on one ofserver 18's components. -
Server 18 can also include learningcomponent 26 which can use standard techniques to learn from how the user responds to visibility options from each individual buddy over time.Learning component 26 can create heuristics that can allowlearning component 26 to eventually make visibility option decisions for the user automatically. For example, if the user always allows a certain buddy to view the user's location between the hours of 8 AM and 10 PM, learningcomponent 26 can automatically choose the visibility option that would allow the buddy to see the user during those hours. The learning component can employ various neural nets algorithms as well as statistical correlation methodologies to come up with the heuristics. Having such heuristics adds to the usability of the system as it will not require the user to specify visibility options explicitly. Once the learning component infers a visibility option it will ask the user to approve that option. - The described system and method manages a mobile device's visibility to the buddies on a user's buddy list and warns a user when his visibility will be divulged. This results in better privacy control for the user. Additionally, the user will receive information regarding the buddy trying to view the user, giving the user's privacy choice the proper information needed to choose a visibility option if a per-buddy warn policy is desired.
- The invention has been described herein with reference to a particular exemplary embodiment. Certain alterations and modifications may be apparent to those skilled in the art, without departing from the scope of the invention. The exemplary embodiments are meant to be illustrative, not limiting of the scope of the invention, which is defined by the appended claims.
- Conditions for the following examples include the condition that the user in question has opted-in to the mobile buddy mapping service and carries his mobile device which is loaded with the software and instrumentation of the present invention in addition to the mobile buddy mapping service. Further, it is a condition that in the mobile buddy mapping service, the user has buddy lists containing a buddy, and the buddy has a buddy list including the user. Another condition is that user and buddy locations are captured or visible to application components by, for example, partnering with location providers or interfacing with Geographic Positioning System (GPS) hardware. The examples, unless otherwise stated the user and the buddy may be immobile or mobile travelling at various speeds and in various directions without affecting the outcome.
- System set up. The user sets up global “encounter horizons” transition actions, or the system will apply some default rules based on some categorization of the user. The user can set up per-buddy encounter horizon transition actions or the system can apply a global rule. The user sets up an anonymized profile (e.g. “identify me as x, y or z when I allow myself to be seen anonymously”) which can be customized to the individual buddy or set globally. The user sets up personalized notification policies on what kinds of messages the system should deliver and how they should be delivered. For example, the system can send text messages, e-mails, video messages, picture messages, etc.
- Example of when a buddy is approaching a user. As illustrated in
FIG. 3 ,user 30 is stationary at position Pu andbuddy 32 is moving at a velocity of Vb towards Pu User 30 has set encounter horizon transitions for distances r1 34 and r2 36 (r r1<r2). The user can set several more encounter horizon transitions if desired.Buddy 32's current radar view shown onbuddy 32's mobile device is represented bybuddy horizon 33. Asbuddy horizon 33 crosses encounterhorizon transition r 2 36, the system triggers an event (text message, etc) and stores buddy 32's radar view. Asbuddy horizon 33 crosses encounterhorizon transition r 1 34, the system determines, based onbuddy horizon 33 andbuddy 32's computed speed, that it is time to notifyuser 30 that he will soon be visible onbuddy 32's radar. The system then sends a message, providing visibility options such as make me visible, cloak me, show me anonymously and make me visible in 10 minutes, etc., touser 30.User 30 can input options that keepuser 30 cloaked until he answers or makes him visible after a certain time on a per buddy or a global basis. Afteruser 30 chooses a visibility option,user 30 will either appear onbuddy 32's radar identified as the user, appear onbuddy 32's radar anonymously, not appear onbuddy 32's radar at all, or appear onbuddy 32's radar at a later time. - Example of when a buddy is changing his zoom factor and the user is stationary. As illustrated in
FIG. 4 ,user 40 is at position Pu and buddy 42 is at position Pb. Buddy 42's current radar view shown on buddy 42's mobile device is represented bybuddy horizon 44.User 40 is presently not visible on buddy 42's radar because Pu is outside the scope ofbuddy horizon 44. InFIG. 4 , buddy 42 begins to zoom out on buddy 42's radar, so that the radar screen starts showing a larger geographical area, or buddy 42 begins to move the scope of buddy 42's radar to cover a different geographic area. The application listening component of buddy 42's application records the zoom operation, each move of buddy 42's radar scope causes a message to be marshaled and sent to the server. The server tracks the implications of buddy 42's zoom operation. After a few zoom operations, it becomes clear thatbuddy horizon 44 will soon encompassuser 40's position. Prior to buddy 42's zoom operation that would placeuser 40 within buddy 42's radar, the system infers that the new region would threaten to makeuser 40 visible and theapplication listening component 16 ofuser 40's application notifiesuser 40 of impending visibility and givesuser 40 visibility options such as make me visible, cloak me, show me anonymously and make me visible in 10 minutes, etc.User 40 can either respond or, ifuser 40 is not currently with his device, pre-set actions including an automatic cloak decision or automatic make me visible action can be taken. Ifuser 40 does choose a visibility option,user 40 will either appear on buddy 42's radar identified as the user, appear on buddy 42's radar anonymously, not appear on buddy 42's radar at all or appear on buddy 42's radar at a later time. The server responds to buddy 42's application listeners' notification withuser 40's choice and will either showuser 40 on buddy 42's radar, not showuser 40 on buddy 42's radar, showuser 40's anonymous profile or showuser 40 at a later time. - Alternatively, if buddy 42 uses pan operations to change his map view, instead of a zoom operation, and those views would threaten to make
user 40 visible, then the system takes similar steps to ensure thatuser 40 is made aware of the impending visibility and given visibility options. - Example when a buddy is zooming out while both the buddy and a user are moving towards each other. This example is very similar to example 3, except that the system now tracks the buddy's motion as well as the buddy's radar view at every zoom operation. Either the buddy can enter the user's outermost boundary or the user can move to a point where the buddy is within the user's outermost boundary. The fact that the user is moving does not affect the system.
- Example when a buddy turns on his device with the radar zoom factor already encompassing a user's position. As illustrated in
FIG. 5 , auser 50 and abuddy 52 are near each other, withinbuddy 52'sbuddy horizon 56 ifbuddy 52's mobile device were on, butbuddy 52's device is off.Buddy 52 then turns onbuddy 52's mobile device, theapplication 14 and theapplication listening component 16 ofbuddy 52's device send a message to theserver 6 indicating the “power on” event and can also include amessage concerning buddy 52'sinitial buddy horizon 56. The server then checks to see which users will be visible onbuddy 52's radar, consequently inferring thatuser 50 will be. The server sends a message touser 50, givinguser 50 visibility options such as make me visible, cloak me, show me anonymously and make me visible in 10 minutes etc. Based onuser 50's response, buddy 52's radar view will haveuser 50 appear identified as himself, appear anonymously, not appear at all or appear at a later time. Ifuser 50's application has been set up byuser 50 to automatically allowuser 50 to be visible to buddy 52, theserver 6 will then contact buddy 42's application listening component to makeuser 50 visible inbuddy 52's radar view.
Claims (20)
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/857,335 US9088889B2 (en) | 2009-03-13 | 2013-04-05 | System and method for privacy-enabled mobile locator services with dynamic encounter horizon |
US14/803,375 US9392444B2 (en) | 2009-03-13 | 2015-07-20 | System and method for privacy-enabled mobile locator services with dynamic encounter horizon |
US15/183,156 US9609509B2 (en) | 2009-03-13 | 2016-06-15 | System and method for privacy-enabled mobile locator services with dynamic encounter horizon |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15997709P | 2009-03-13 | 2009-03-13 | |
US12/617,844 US8417262B2 (en) | 2009-03-13 | 2009-11-13 | System and method for privacy-enabled mobile locator services with dynamic encounter horizon |
US13/857,335 US9088889B2 (en) | 2009-03-13 | 2013-04-05 | System and method for privacy-enabled mobile locator services with dynamic encounter horizon |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/617,844 Continuation US8417262B2 (en) | 2009-03-13 | 2009-11-13 | System and method for privacy-enabled mobile locator services with dynamic encounter horizon |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/803,375 Continuation US9392444B2 (en) | 2009-03-13 | 2015-07-20 | System and method for privacy-enabled mobile locator services with dynamic encounter horizon |
Publications (2)
Publication Number | Publication Date |
---|---|
US20130225126A1 true US20130225126A1 (en) | 2013-08-29 |
US9088889B2 US9088889B2 (en) | 2015-07-21 |
Family
ID=42728806
Family Applications (4)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/617,844 Active 2031-04-25 US8417262B2 (en) | 2009-03-13 | 2009-11-13 | System and method for privacy-enabled mobile locator services with dynamic encounter horizon |
US13/857,335 Active 2030-08-21 US9088889B2 (en) | 2009-03-13 | 2013-04-05 | System and method for privacy-enabled mobile locator services with dynamic encounter horizon |
US14/803,375 Active US9392444B2 (en) | 2009-03-13 | 2015-07-20 | System and method for privacy-enabled mobile locator services with dynamic encounter horizon |
US15/183,156 Active US9609509B2 (en) | 2009-03-13 | 2016-06-15 | System and method for privacy-enabled mobile locator services with dynamic encounter horizon |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/617,844 Active 2031-04-25 US8417262B2 (en) | 2009-03-13 | 2009-11-13 | System and method for privacy-enabled mobile locator services with dynamic encounter horizon |
Family Applications After (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/803,375 Active US9392444B2 (en) | 2009-03-13 | 2015-07-20 | System and method for privacy-enabled mobile locator services with dynamic encounter horizon |
US15/183,156 Active US9609509B2 (en) | 2009-03-13 | 2016-06-15 | System and method for privacy-enabled mobile locator services with dynamic encounter horizon |
Country Status (6)
Country | Link |
---|---|
US (4) | US8417262B2 (en) |
EP (1) | EP2545697B1 (en) |
JP (4) | JP5319792B2 (en) |
KR (1) | KR101186389B1 (en) |
CN (2) | CN102388598B (en) |
WO (1) | WO2010105118A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2016058130A1 (en) * | 2014-10-14 | 2016-04-21 | 华为技术有限公司 | Prose monitoring method and device |
Families Citing this family (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8639757B1 (en) * | 2011-08-12 | 2014-01-28 | Sprint Communications Company L.P. | User localization using friend location information |
US8417262B2 (en) | 2009-03-13 | 2013-04-09 | Tti Inventions D Llc | System and method for privacy-enabled mobile locator services with dynamic encounter horizon |
WO2013022440A1 (en) * | 2011-08-09 | 2013-02-14 | Research In Motion Limited | Harvesting communication parameter observations in gnss-denied environments |
US9002380B2 (en) * | 2012-06-08 | 2015-04-07 | Apple Inc. | Proximity-based notifications in a mobile device |
US9411967B2 (en) | 2012-08-24 | 2016-08-09 | Environmental Systems Research Institute (ESRI) | Systems and methods for managing location data and providing a privacy framework |
KR101469593B1 (en) * | 2013-02-20 | 2014-12-05 | 서용창 | Method for detecting synchronized terminal posed similar to a base pose data, method for sending a message and computer readable recording medium storing program for the same |
CN104407708B (en) * | 2014-12-08 | 2018-04-10 | 东莞宇龙通信科技有限公司 | Notify reminding method, notice suggestion device, terminal and notice prompt system |
WO2017153332A1 (en) | 2016-03-11 | 2017-09-14 | Limbic Life Ag | Occupant support device and system for controlling objects |
EP3226182A1 (en) | 2016-03-29 | 2017-10-04 | Locatee AG | Device, system and method for monitoring usage of functional facilities |
EP4216093A1 (en) | 2017-02-07 | 2023-07-26 | InterDigital VC Holdings, Inc. | System and method to prevent surveillance and preserve privacy in virtual reality |
CN108696558B (en) * | 2017-04-11 | 2022-04-26 | 腾讯科技(深圳)有限公司 | Position information processing method and device |
US11164380B2 (en) | 2017-12-05 | 2021-11-02 | Samsung Electronics Co., Ltd. | System and method for transition boundaries and distance responsive interfaces in augmented and virtual reality |
CN108235250A (en) * | 2018-01-19 | 2018-06-29 | 赵星宇 | A kind of friend-making chat method and system based on the real-time reconnaissance probe in geographical location stranger at one's side |
US10713386B2 (en) | 2018-08-06 | 2020-07-14 | Arrive Group, Inc. | Method and system for protecting user privacy |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120019365A1 (en) * | 2009-02-20 | 2012-01-26 | Solocem Systems Oy | Short-range communication-enabled mobile device, method and related server arrangement |
US8831640B2 (en) * | 2009-09-30 | 2014-09-09 | Telecom Italia S.P.A. | Method and system for notifying proximity of mobile communication terminals users |
Family Cites Families (45)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH10257545A (en) * | 1997-03-11 | 1998-09-25 | Sony Corp | Communication system and mobile communication terminal equipment |
WO2000022860A1 (en) * | 1998-10-12 | 2000-04-20 | Janus Friis Degnbol | A method and a system for transmitting data between units |
US6463471B1 (en) * | 1998-12-28 | 2002-10-08 | Intel Corporation | Method and system for validating and distributing network presence information for peers of interest |
US6301609B1 (en) * | 1999-07-07 | 2001-10-09 | Lucent Technologies Inc. | Assignable associate priorities for user-definable instant messaging buddy groups |
JP3707311B2 (en) | 1999-08-25 | 2005-10-19 | 株式会社デンソー | Mobile communication device and mobile communication system |
US7958457B1 (en) * | 1999-12-20 | 2011-06-07 | Wireless Agents, Llc | Method and apparatus for scheduling presentation of digital content on a personal communication device |
US6735430B1 (en) * | 2000-04-10 | 2004-05-11 | Motorola, Inc. | Musical telephone with near field communication capabilities |
US8489669B2 (en) | 2000-06-07 | 2013-07-16 | Apple Inc. | Mobile data processing system moving interest radius |
US6968179B1 (en) * | 2000-07-27 | 2005-11-22 | Microsoft Corporation | Place specific buddy list services |
JP4414570B2 (en) * | 2000-08-02 | 2010-02-10 | シャープ株式会社 | Mobile terminal, location information management system, and recording medium on which location information management program is recorded |
US6681108B1 (en) * | 2000-08-16 | 2004-01-20 | Mitsubishi Electric Research Laboratories, Inc. | Network and method for identifying entities sharing a common network location |
US20070037605A1 (en) * | 2000-08-29 | 2007-02-15 | Logan James D | Methods and apparatus for controlling cellular and portable phones |
US7080139B1 (en) | 2001-04-24 | 2006-07-18 | Fatbubble, Inc | Method and apparatus for selectively sharing and passively tracking communication device experiences |
JP2002368883A (en) * | 2001-06-08 | 2002-12-20 | Takenao Hattori | Information providing system and information providing server |
US7346658B2 (en) * | 2001-08-08 | 2008-03-18 | At&T Delaware Intellectual Property, Inc. | System and method for notifying an offline global computer network user of an online interaction |
JP3806642B2 (en) * | 2001-11-15 | 2006-08-09 | 三洋電機株式会社 | Mobile communication device and communication method |
JP2003174519A (en) * | 2001-12-05 | 2003-06-20 | Matsushita Electric Ind Co Ltd | Mobile terminal |
CA2499524C (en) * | 2002-09-19 | 2011-02-01 | Research In Motion Limited | Apparatus and method of wireless instant messaging |
US7590696B1 (en) * | 2002-11-18 | 2009-09-15 | Aol Llc | Enhanced buddy list using mobile device identifiers |
EP1786173B1 (en) | 2003-01-22 | 2013-06-26 | NEC Corporation | Dynamic buddy list generation method |
JP2004274586A (en) * | 2003-03-11 | 2004-09-30 | Nec Corp | Mobile phone system with automatic searching function of unspecified opposite party and automatic searching method of unspecified opposite party by mobile terminal |
WO2004104789A2 (en) * | 2003-05-20 | 2004-12-02 | America Online, Inc. | Presence and geographic location notification |
JP2005123970A (en) * | 2003-10-17 | 2005-05-12 | Vodafone Kk | Server and client device in presence display system |
US7409203B2 (en) | 2003-11-12 | 2008-08-05 | Redknee Inc. | Method and system for the prevention of unwanted wireless telecommunications |
US7292870B2 (en) * | 2003-12-24 | 2007-11-06 | Zipit Wireless, Inc. | Instant messaging terminal adapted for Wi-Fi access points |
WO2005101863A2 (en) | 2004-04-12 | 2005-10-27 | Bayne Anthony J | System and method for the distribution of advertising and associated coupons via mobile media platforms |
KR20060001129A (en) | 2004-06-30 | 2006-01-06 | 강성부 | Online bid system and method |
KR100671164B1 (en) | 2004-07-30 | 2007-01-18 | 팅크웨어(주) | System and method for providing position information using mobile phone |
KR20060012486A (en) | 2004-08-03 | 2006-02-08 | 허령 | Method for auto caption film movies and apparatus of these |
US7353034B2 (en) * | 2005-04-04 | 2008-04-01 | X One, Inc. | Location sharing and tracking using mobile phones or other wireless devices |
KR100687413B1 (en) | 2005-05-26 | 2007-02-26 | 에스케이 텔레콤주식회사 | System and method for providing service for searching friends |
US8260725B2 (en) * | 2005-11-14 | 2012-09-04 | Crawford C S Lee | Method of conducting operations for a social network application including notification list generation with offer hyperlinks according to notification rules |
US20070143423A1 (en) | 2005-12-21 | 2007-06-21 | Oliver Kieselbach | Method and system for allowing a session initiating user to select one or more privacy settings to be applied to an instant messaging session from among multiple possible privacy controls |
JP2007267175A (en) * | 2006-03-29 | 2007-10-11 | Toshiba Corp | Mobile radio terminal |
US8989778B2 (en) | 2006-06-01 | 2015-03-24 | Green Dot Corporation | Secure and private location sharing for location-aware mobile communication devices |
US8571580B2 (en) | 2006-06-01 | 2013-10-29 | Loopt Llc. | Displaying the location of individuals on an interactive map display on a mobile communication device |
US7823073B2 (en) * | 2006-07-28 | 2010-10-26 | Microsoft Corporation | Presence-based location and/or proximity awareness |
US20080108330A1 (en) * | 2006-11-07 | 2008-05-08 | O'neil Douglas | Methods, systems and computer products for notification to a remote party of mobile party presence status change |
CN101257645A (en) * | 2007-03-02 | 2008-09-03 | 英华达(南京)科技有限公司 | Online chatting and positioning method of wireless mobile communication and online chatting and positioning system thereof |
KR20080081686A (en) | 2007-03-06 | 2008-09-10 | 엘지노텔 주식회사 | Mobile instant messenger system and method for providing location information |
JP2008252298A (en) * | 2007-03-29 | 2008-10-16 | Sony Corp | Radio communication equipment, radio communication method, information processor, information processing method and program |
WO2008129626A1 (en) * | 2007-04-10 | 2008-10-30 | Panasonic Corporation | Mobile terminal |
US20090177695A1 (en) * | 2008-01-08 | 2009-07-09 | Microsoft Corporation | Integration of social networking and merchandising |
US8417262B2 (en) * | 2009-03-13 | 2013-04-09 | Tti Inventions D Llc | System and method for privacy-enabled mobile locator services with dynamic encounter horizon |
US8249078B1 (en) * | 2009-11-16 | 2012-08-21 | Sprint Spectrum L.P. | Prediction and use of call setup signaling latency for advanced wakeup and notification |
-
2009
- 2009-11-13 US US12/617,844 patent/US8417262B2/en active Active
-
2010
- 2010-03-12 JP JP2011554221A patent/JP5319792B2/en active Active
- 2010-03-12 CN CN201080011461.9A patent/CN102388598B/en active Active
- 2010-03-12 KR KR1020117023921A patent/KR101186389B1/en active IP Right Grant
- 2010-03-12 CN CN201410583438.7A patent/CN104283971B/en active Active
- 2010-03-12 WO PCT/US2010/027069 patent/WO2010105118A1/en active Application Filing
- 2010-03-12 EP EP10751457.2A patent/EP2545697B1/en active Active
-
2013
- 2013-04-05 US US13/857,335 patent/US9088889B2/en active Active
- 2013-07-11 JP JP2013145473A patent/JP5701943B2/en active Active
-
2015
- 2015-02-18 JP JP2015029400A patent/JP5990813B2/en active Active
- 2015-07-20 US US14/803,375 patent/US9392444B2/en active Active
-
2016
- 2016-06-15 US US15/183,156 patent/US9609509B2/en active Active
- 2016-07-22 JP JP2016144012A patent/JP6364451B2/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120019365A1 (en) * | 2009-02-20 | 2012-01-26 | Solocem Systems Oy | Short-range communication-enabled mobile device, method and related server arrangement |
US8831640B2 (en) * | 2009-09-30 | 2014-09-09 | Telecom Italia S.P.A. | Method and system for notifying proximity of mobile communication terminals users |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2016058130A1 (en) * | 2014-10-14 | 2016-04-21 | 华为技术有限公司 | Prose monitoring method and device |
Also Published As
Publication number | Publication date |
---|---|
CN104283971A (en) | 2015-01-14 |
JP2013219834A (en) | 2013-10-24 |
EP2545697A4 (en) | 2014-06-25 |
CN104283971B (en) | 2018-03-09 |
JP5990813B2 (en) | 2016-09-14 |
US20150327059A1 (en) | 2015-11-12 |
JP6364451B2 (en) | 2018-07-25 |
WO2010105118A1 (en) | 2010-09-16 |
JP5319792B2 (en) | 2013-10-16 |
CN102388598B (en) | 2014-11-19 |
US20100233999A1 (en) | 2010-09-16 |
CN102388598A (en) | 2012-03-21 |
EP2545697B1 (en) | 2017-01-11 |
KR101186389B1 (en) | 2012-09-26 |
JP2012520625A (en) | 2012-09-06 |
US9088889B2 (en) | 2015-07-21 |
JP2016187223A (en) | 2016-10-27 |
US20160302059A1 (en) | 2016-10-13 |
JP5701943B2 (en) | 2015-04-15 |
US8417262B2 (en) | 2013-04-09 |
EP2545697A1 (en) | 2013-01-16 |
KR20110138369A (en) | 2011-12-27 |
US9609509B2 (en) | 2017-03-28 |
JP2015111931A (en) | 2015-06-18 |
US9392444B2 (en) | 2016-07-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9609509B2 (en) | System and method for privacy-enabled mobile locator services with dynamic encounter horizon | |
US11128979B2 (en) | Inferring user availability for a communication | |
US9560479B2 (en) | Secure and private location sharing for location-aware mobile communication devices | |
US8805417B2 (en) | Dynamic contact list display | |
US9461955B1 (en) | Transmission of information during low-bandwidth network service | |
US20070282621A1 (en) | Mobile dating system incorporating user location information | |
US20120172062A1 (en) | Network manager system for location-aware mobile communication devices | |
US20080291022A1 (en) | Automatic locating system | |
EP2191434A2 (en) | Location based presence and privacy management | |
US11252124B2 (en) | Electronic messaging systems | |
US8682991B2 (en) | Electronic messaging systems |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: TTI INVENTIONS D LLC, DELAWARE Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:TELCORDIA TECHNOLOGIES, INC.;REEL/FRAME:030853/0101 Effective date: 20110125 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
AS | Assignment |
Owner name: NYTELL SOFTWARE LLC, DELAWARE Free format text: MERGER;ASSIGNOR:TTI INVENTIONS D LLC;REEL/FRAME:037391/0862 Effective date: 20150826 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 4 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 8 |